General
-
Target
534b0503426f82746a3b5b8588e8c98312230c2e41979190638416d86a67009c.exe
-
Size
1.9MB
-
Sample
240521-bmeafadg6s
-
MD5
72929dc9cd7ff04c903459f70d0756a6
-
SHA1
ecc70471eec1491257d0b954e92484a666b15a81
-
SHA256
534b0503426f82746a3b5b8588e8c98312230c2e41979190638416d86a67009c
-
SHA512
1bfb064e45d906fd6fa7c75f3a32cb4a27cb32f3dd3564334d6573d5430e465d6929a1330905f42c81bb538976cccc7c9e10ed60e36b1884e12c797720983d47
-
SSDEEP
49152:QGJTeLOqwizFY/f1QRv41eaTNGC0Y8ZxMjI6IeLH3q:T1wOqwMY/Kv41VfBJj
Static task
static1
Behavioral task
behavioral1
Sample
534b0503426f82746a3b5b8588e8c98312230c2e41979190638416d86a67009c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
534b0503426f82746a3b5b8588e8c98312230c2e41979190638416d86a67009c.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
534b0503426f82746a3b5b8588e8c98312230c2e41979190638416d86a67009c.exe
-
Size
1.9MB
-
MD5
72929dc9cd7ff04c903459f70d0756a6
-
SHA1
ecc70471eec1491257d0b954e92484a666b15a81
-
SHA256
534b0503426f82746a3b5b8588e8c98312230c2e41979190638416d86a67009c
-
SHA512
1bfb064e45d906fd6fa7c75f3a32cb4a27cb32f3dd3564334d6573d5430e465d6929a1330905f42c81bb538976cccc7c9e10ed60e36b1884e12c797720983d47
-
SSDEEP
49152:QGJTeLOqwizFY/f1QRv41eaTNGC0Y8ZxMjI6IeLH3q:T1wOqwMY/Kv41VfBJj
Score9/10-
UPX dump on OEP (original entry point)
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-